Skip to main content
Log in

A trust-based detection scheme to explore anomaly prevention in social networks

  • Regular Paper
  • Published:
Knowledge and Information Systems Aims and scope Submit manuscript

Abstract

With the increasing popularity of social networks, malicious behaviors in social networks have brought severe security threats. To address the growing problem of malicious activities on social networks, researchers have proposed different detection and mitigation methods. However, the proposed approaches mainly focus on anomaly detection rather than anomaly prevention. In order to stop and reduce security threats in social networks, the anomalous behavior should be detected before it actually happens. Although some work exists, more effective and novel techniques need to be done toward anomaly prevention. In the paper, we explore the issue of anomaly prevention and creatively introduce trust to measure the similarity between users. Finally, a trust-based anomaly detection scheme is proposed, which can find collective anomaly before it brings greater security risks. The main contributions of our paper are: (1) constructing similar trust graph; (2) improving spectral clustering algorithm; (3) detecting collective anomalies in real time. In order to evaluate the effectiveness of our anomaly detection scheme, a series of test scenarios are developed. Three types of collaborative attacks are simulated on OMNeT++ platform. Simulation results show the good performance of the proposed anomaly detection scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. https://www.welcometobora.com/

  2. Kaur R, Singh S (2016) A survey of data mining and social network analysis based anomaly detection techniques. Egypt Inform J 17:199–216

    Article  Google Scholar 

  3. Jin L, Chen Y, Wang TY et al (2013) Understanding user behavior in online social networks: a survey. IEEE Commun Mag 51(9):144–150

    Article  Google Scholar 

  4. Patil B, Bedi RK (2014) Survey on anomaly detection techniques in social networking. In Proceedings of the international journal of engineering research and technology, pp 1573–1576

  5. Viswanath B, Bashir MA, Crovella M et al (2014) Towards detecting anomalous user behavior in online social networks. In: Proceedings of the 23rd USENIX security symposium (USENIX Security), pp 223–238

  6. Xiao C, Freeman DM, Hwa T (2015) Detecting clusters of fake accounts in online social networks. In: Proceedings of the eighth ACM workshop on artificial intelligence and security, pp 91–101

  7. Henderson K, Gallagher B, Li L et al (2011) It’s who you know: graph mining using recursive structural features. In: Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining, pp 663–671

  8. Hassanzadeh R, Nayak R, Stebila D (2012) Analyzing the effectiveness of graph metrics for anomaly detection in online social networks. In: Proceedings of the international conference on web information systems engineering, pp 624–630

  9. Rezaei A, Kasirun ZM, Rohani VA et al (2013) Anomaly detection in online social networks using structure-based technique. In: Proceedings of the eighth international conference on internet technology and secured transactions, pp 619–622

  10. Ying X, Wu X, Barbara D (2011) Spectrum based fraud detection in social networks. In: Proceedings of the IEEE 27th international conference on data engineering, pp 912–923

  11. OMNET++. http://www.omnetpp.org

  12. Vlasselaer VV, Akoglu L, Eliassi-Rad T et al (2015) Guilt-by-constellation: fraud detection by suspicious clique memberships. In: Proceedings of the 48 annual Hawaii international conference on system sciences, pp 918–927

  13. Kirchner C (2011) Implementing social network analysis for fraud prevention. CGI Group Ind, Düsseldorf

    Google Scholar 

  14. Sensarma D, Sarma SS (2015) A survey on different graph based anomaly detection techniques. Indian J Sci Technol 8(31):1–7

    Article  Google Scholar 

  15. Sherchan W, Nepal S, Paris C (2013) A survey of trust in social networks. ACM Comput Surv 45(4):1–33

    Article  Google Scholar 

  16. Adali S, Escriva R, Goldberg MK (2010) Measuring behavioral trust in social networks. In: Proceedings of the IEEE international conference on intelligence and security informatics, pp 1–6

  17. Sonja GK, Bitter S (2014) Trust in online social networks: a multifaceted perspective. Forum Soc Econ 45(1):48–68

    Google Scholar 

  18. Ketan A, Jay K (2017) Anomaly detection in online social network: a survey. In: Proceedings of the international conference on inventive communication and computational technologies, pp 456–459

  19. Alam MAU, Roy N, Petruska M et al (2016) Smart-energy group anomaly based behavioral abnormality detection. In: Proceedings of the IEEE wireless health conference, pp 38–45

  20. Briana A, LiEsa B, Rahmira R et al (2016) Behavior-based anomaly detection via immunity-inspired algorithms. In: Proceedings of the IEEE international conference on computer communications and networks, pp 1–6

  21. Said A, Abbasi RA, Maqbool O et al (2018) CC-GA: a clustering coefficient based genetic algorithm for detecting communities in social networks. Appl Soft Comput 63:59–70

    Article  Google Scholar 

  22. Jiang WJ, Wang GJ, Bhuiyan MZA et al (2016) Understanding graph-based trust evaluation in online social networks: methodologies and challenges. ACM Comput Surv 49(1):1–36

    Article  Google Scholar 

  23. Chen SH, Wang GJ, Jia WJ (2016) Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph. Future Gener Comput Syst 55:391–400

    Article  Google Scholar 

  24. Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644

    Article  Google Scholar 

  25. Gong X, Yu T, Lee AJ (2013) Bounding trust under uncertain topology information in reputation-based trust systems. Lect Notes Comput Sci 7923:643–648

    Article  Google Scholar 

  26. Yuan W, Guan D, Lee YK (2010) Improved trust-aware recommender system using small-worldness of trust networks. Knowl-Based Syst 23(3):232–238

    Article  Google Scholar 

  27. Yoon KP, Hwang CL (1995) Multiple attribute decision making, an introduction. Sage University Papers (Series: Quantitative applications in the social sciences)

  28. Freeman L (1977) A set of measures of centrality based upon betweenness. Sociometry 40:35–41

    Article  Google Scholar 

  29. Xu K, Wang F, Gu L (2011) Network-aware behavior clustering of internet end hosts. In: Proceedings of the IEEE INFOCOM, pp 2078–2086

  30. Xu K, Wang F (2011) Behavioral graph analysis of internet applications. In: Proceedings of the IEEE global telecommunications conference, pp 1–5

  31. Douban. http://www.douban.com

Download references

Acknowledgements

The work in this paper has been supported by National Natural Science Foundation of China (Program No. 71501156) and China Postdoctoral Science Foundation (Program No. 2014M560796).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xu Wu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, X. A trust-based detection scheme to explore anomaly prevention in social networks. Knowl Inf Syst 60, 1565–1586 (2019). https://doi.org/10.1007/s10115-018-1276-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10115-018-1276-9

Keywords

Navigation